Search results for "information security policy"

showing 10 items of 15 documents

State of the Art in Information Security Policy Development

2020

Despite the prevalence of research that exists under the label of “information security policies” (ISPs), there is no consensus on what an ISP means or how ISPs should be developed. This article reviews state-of-the-art ISP development by examining a diverse sample of literature on the subject. The definition and function of an ISP is studied first, revealing a rich tapestry of different notions behind the same term. When looking at the broad picture of the research on ISP development methods, we find different phases and levels of detail. Analyzing the different views on the content, context, and strategy alignment provides for further understanding on the complexity of the matter. As an o…

General Computer ScienceComputer scienceliterature reviewmedia_common.quotation_subjectContext (language use)Sample (statistics)02 engineering and technologyOutcome (game theory)information security policyconcept definitionState (polity)development method0202 electrical engineering electronic engineering information engineeringtietoturvaFunction (engineering)media_commonComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSpolicy developmenttietoturvapolitiikka020206 networking & telecommunicationsSubject (documents)kehittäminenInformation securityData scienceTerm (time)Information security policy020201 artificial intelligence & image processingLawkäsiteanalyysi
researchProduct

Abductive innovations in information security policy development : an ethnographic study

2019

Developing organisational information security (InfoSec) policies that account for international best practices but are contextual is as much an opportunity for improving InfoSec as it is a challenge. Previous research indicates that organisations should create InfoSec policies based on best practices (top-down) and simultaneously encourages participatory development (bottom-up). These contradictory suggestions place managers in a dilemma: Should they follow a top-down or bottom-up approach? In this research, we build on an ethnographic approach to study how an innovative engineering company (MachineryCorp) managed the contradiction when the firm developed an InfoSec policy. Drawing on the …

ISS policyKnowledge managementetnografiabusiness.industryBest practice05 social sciencestietoturvapolitiikkaorganisaatiot02 engineering and technologyInformation securityLibrary and Information Sciencesyrityksetinnovaatiotabductive innovation020204 information systemsPolitical science0502 economics and businessEthnography0202 electrical engineering electronic engineering information engineeringInformation security policytietoturvabusiness050203 business & managementInformation Systemsinformation security policy development
researchProduct

Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures

2020

Abstract A principal concern of organizations is the failure of employees to comply with information security policies (ISPs). Deterrence theory is one of the most frequently used theories for examining ISP violations, yet studies using this theory have produced mixed results. Past research has indicated that cultural differences may be one reason for these inconsistent findings and have hence called for cross-cultural research on deterrence in information security. To address this gap, we formulated a model including deterrence, moral beliefs, shame, and neutralization techniques and tested it with the employees from 48 countries working for a large multinational company.

Information Systems and Managementmedia_common.quotation_subjectPrincipal (computer security)030508 substance abuseShame02 engineering and technologyInformation securityManagement Information Systems03 medical and health sciencesMultinational corporation020204 information systemsCultural diversity0202 electrical engineering electronic engineering information engineeringSanctionsInformation security policyDeterrence theoryBusiness0305 other medical scienceInformation SystemsLaw and economicsmedia_commonInformation & Management
researchProduct

Employee Information Security Practices: A Framework and Research Agenda

2020

Author's accepted manuscript Employee information security practices are pivotal to prevent, detect, and respond to security incidents. This paper synthesizes insights from research on challenges related to employee information security practices and measures to address them. The challenges identified are associated to idiosyncratic aspects of communities and individuals within organizations (culture and personal characteristics) and to systemic aspects of organizations (procedural and structural arrangements). The measures identified aim to enhance systemic capabilities and to adapt security mechanisms to the idiosyncratic characteristics and are categorized as: (a) measures of training an…

MarketingComputer Networks and Communicationsbusiness.industryStrategy and ManagementInformation security policyInformation securityBusinessPublic relationsVDP::Samfunnsvitenskap: 200::Biblioteks- og informasjonsvitenskap: 320::Informasjons- og kommunikasjonssystemer: 321Computer Science ApplicationsManagement Information Systems
researchProduct

Can individuals’ neutralization techniques be overcome? A field experiment on password policy

2020

Individuals’ lack of adherence to password security policy is a persistent problem for organizations. This problem is especially worrisome because passwords remain the primary authentication mechanism for information systems, and the number of passwords has been increasing. For these reasons, determining methods to improve individuals’ adherence to password-security policies constitutes an important issue for organizations. Extant research has shown that individuals use neutralization techniques, i.e., types of rationalizations, to disregard organizational information-security policies. What has not been determined from extant information security research is whether these neutralizations c…

PasswordAuthenticationPassword policyGeneral Computer Scienceinformation securitybusiness.industryComputer scienceInternet privacytietoturvapolitiikka020206 networking & telecommunicationsContext (language use)02 engineering and technologyInformation securityneutralizationsalasanatpasswordsAuthentication (law)Password strengthinformation security policy0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingtietoturvabusinesshenkilöstökoulutusLawComputers & Security
researchProduct

Method Framework for Developing Enterprise Architecture Security Principles

2019

Organizations need to consider many facets of information security in their daily operations – among others, the rapidly increasing use of IT, emerging technologies and digitalization of organizations’ core resources provoke new threats that can be difficult to anticipate. It has been argued that the security and privacy considerations should be embedded in all the areas of organizational activities instead of only relying technical security mechanisms provided by the underlying systems and software. Enterprise Architecture Management (EAM) offers a holistic approach for managing different dimensions of an organization, and can be conceived as a coherent and consistent set of principles tha…

Process managementlcsh:T58.5-58.64information securitylcsh:Information technologyComputer scienceEmerging technologiesenterprise architecture managementconstructive researchtietoturvapolitiikkaEnterprise architectureInformation securityyrityksetenterprise architecture principleBody of knowledgeinformation security policyConstructive researchEnterprise Architecture Management; Enterprise Architecture Principle; Information Security; Information Security Policy; Method Framework; Constructive ResearchEnterprise architecture managementGeneral Materials SciencekokonaisarkkitehtuuritietoturvaSet (psychology)Empirical evidencemethod frameworktietojärjestelmätComplex Systems Informatics and Modeling Quarterly
researchProduct

Influence of Organizational Culture on Employees Information Security Policy Compliance in Ethiopian Companies

2021

Information security is one of the organizations' top agendas worldwide. Similarly, there is a growing trend in the kinds and rate of security breaches. Information security experts and scholars concentrate on outsiders' threats; conversely, insiders are responsible for most security breaches in organizations. Further, the majority of information security research findings are limited to solutions that are technically focused. However, it is now recognized that the technological approach alone does not carry the security level needed. So this led researchers to embark on socio-technical approaches. Thus, this study explores organizational culture's effect on employees' intention to comply w…

Rational Choice TheoryorganisaatiokulttuuriInformation SecuritytietoturvapolitiikkaInformation Security Policy CompliancetietoturvaOrganizational Culturerationaalisen valinnan teoria
researchProduct

Effects of Sanctions, Moral Beliefs, and Neutralization on Information Security Policy Violations Across Cultures

2020

A principal concern of organizations is the failure of employees to comply with information security policies (ISPs). Deterrence theory is one of the most frequently used theories for examining ISP violations, yet studies using this theory have produced mixed results. Past research has indicated that cultural differences may be one reason for these inconsistent findings and have hence called for cross-cultural research on deterrence in information security. To address this gap, we formulated a model including deterrence, moral beliefs, shame, and neutralization techniques and tested it with the employees from 48 countries working for a large multinational company. peerReviewed

deterrencekansainväliset yrityksetinformation securityshameorganisaatiottietoturvapolitiikkaneutralizationrikkomuksetmoraalikulttuurienvälinen tutkimusnational culturekulttuurierotmoral beliefsinformation security policy violationstietoturvakansallinen kulttuuri
researchProduct

Review of the methods for the development of information security policies at organizations

2016

This thesis aims to have an overview of the current studies in the development of information security policy. The research is based on a systematical literature review. The study focuses on the development process of information security policy and other relevant issues in information security policy development within organizations. There are four research questions are proposed based on this topic: 1) what are the functions of information security policy; 2) what kind of stakeholders should be involved in the development of information security policy; 3) what is the information security policy lifecycle; 4) what are the methods in development of information security policy. The research…

functions of information security policyinformation security policydevelopment lifecycletietoturvapolitiikkakehittäminentietoturvaelinkaariyrityksetdevelopment methodsstakeholders of information security policy
researchProduct

Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions

2022

In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security research. Our review of IS research applying DT highlights that many fundamental assumptions of DT are unrecognized and therefore unexamined. This may have resulted in misunderstandings and conceptual confusions regarding some of the basic concepts of DT. For example, some IS studies confuse general deterrence with specific deterrence or do not recognize the difference between the two. Moreover, these fundamental assumptions, when directly examined, may provide importan…

information security policy complianceComputer Networks and Communicationsohjeidenmukainen käyttäytyminentietoturvapolitiikkatietoturvadeterrent effectpelotteetpeloteteoriadeterrence theoryManagement Information Systemstietojärjestelmät
researchProduct